Analysis

  • max time kernel
    102s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-02-2025 10:23

General

  • Target

    2560-3-0x00000000012B0000-0x000000000194D000-memory.exe

  • Size

    6.6MB

  • MD5

    86c72a870587ef779c9ffb5c770121e7

  • SHA1

    60ab5321b297c7cc9aee6694d368e3f085704d70

  • SHA256

    f318e2e801070964029bd97961649134d3b4963cc6d59bf65337c02f405a9075

  • SHA512

    97598f0b6f382e815d016b82882e3d14415958e0d542a42c9d17d39b91872a45ed6493809fbb96a1986a9c11dbbeb8adf48153fb19a7e24b0ffa1bc0093410e6

  • SSDEEP

    98304:kHfiMAonqrstotbDgJAfVFXECbehmESXw2Fz4Zjqj:BQNJiHEC6hmEn2FEoj

Malware Config

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2560-3-0x00000000012B0000-0x000000000194D000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2560-3-0x00000000012B0000-0x000000000194D000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1060
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 216
      2⤵
      • Program crash
      PID:2068
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1060 -ip 1060
    1⤵
      PID:3512

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1060-0-0x0000000000460000-0x0000000000AFD000-memory.dmp

      Filesize

      6.6MB